Solved

double encryption

Posted on 2011-09-09
7
413 Views
Last Modified: 2012-05-12
Is there any benefits in enforcing double encryption on my corproatye laptop.

Let me explain - all laptop devices come with pointsec installed - yet I sometimes have to store quite sensitive data locally on my device - could I not put something like truecrypt on and then encrypt these files when they are saved locally.

My fear is when I logon to truecrypt I essentially "unencrypt" eevrything - but I cant quite get my head around how encrypting certain files again really improves things.
0
Comment
Question by:pma111
7 Comments
 
LVL 9

Assisted Solution

by:akitsupport
akitsupport earned 100 total points
ID: 36509273
In many ways your just doubling up.  If the main solution your using is good enough why use another?

You could also end up with one item causing issues with the other as well.

0
 
LVL 3

Author Comment

by:pma111
ID: 36509350
I was wondering perhaps if I got infected by malware - as I unencrypt when I boot my machine with pointsec - the malware could see / send any documents - anything sensitive should remain encrypted "always" unless specifically needed, whereas pointsec opens "all my files" when I authenticate" - truecrypt would keep those high sensitive ones encrypted unless I manually mounted that file via authentication
0
 
LVL 9

Expert Comment

by:akitsupport
ID: 36509400
I would think as you have an encryption software your using a good anti virus though?

I'd consider using malwarebytes in conjunction with what you ahve if your really worried.

0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 3

Author Comment

by:pma111
ID: 36509837
Yeah I guess I am overparanoid
0
 
LVL 32

Accepted Solution

by:
aleghart earned 200 total points
ID: 36512312
It's not overly paranoid.  Once you logon to the OS, your user credentials can be used by anyone with local or remote access.  This means your local files (even if encrypted by the OS), your network files, even connections to network servers & workstations...because your logon credentials are unlocked and used without challenge.

Decent password protection software offers the ability to challenge before using the credentials.  LastPass, for instance, can logon to a site or show locked info automatically, or only after a password challenge.

Same can be done for your sensitive files.  3rd-party encryption (even as simple as a ZIP file) would decrease exposure.  It wouldn't stop somebody from stealing your files if you were hacked or forced to logon to your computer.  But, you would have an amount of time you could reasonably expect some of that data to be safe.  This gives you the chance to make the data irrelevant, or at least take measures to warn others and secure other assets against the breach.

Traveling internationally, your computer is subject to seizure and search.  You may be required to logon to your computer or face detention.  Your computer can also be confiscated for later search.  (This is for the U.S. ...your country may vary.)
0
 
LVL 9

Assisted Solution

by:gtkfreak
gtkfreak earned 100 total points
ID: 36515177
Double encryption offers one more layer of protection. therefore, at times i too do that. You can also have truecrypt encryption for the whole volume, and within that one more layer of encryption on some truecrypt containers that have sensitive files. End of day, once you log into to your system, anything going across a network will be unencrypted or plaintext. Just an additional encryption layer on sensitive files.

During travel, you are required to enter a password to allow law enforcement to search your computer, but an additional encrypted container may not require you to enter that password, unless it is detected during the search. However, truecrypt does offer hidden volumes to help avoid detection. The operative word is avoid and not evade.
0
 
LVL 12

Assisted Solution

by:coredatarecovery
coredatarecovery earned 100 total points
ID: 36515228
Truecrypt is a great solution in this case
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives bas…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now